1 Flashcards

(34 cards)

1
Q

Categories of security controls

A

Technical, managerial, operational, physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Technical controls

A

Technology-based measures such as
firewalls and encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Managerial controls

A

Policies, procedures, and guidelines
for security management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Operational controls

A

Day-to-day security practices such
as monitoring and access management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Physical controls

A

Measures to safeguard physical assets and premises

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of security controls

A

Preventive, deterrent, detective, corrective, compensating, directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Preventive controls

A

Aimed at preventing security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Deterrent control

A

Intended to discourage potential attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Detective controls

A

Focused on identifying and detecting
security incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Corrective controls

A

Implemented after an incident to
mitigate the impact

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compensating controls

A

Alternative measures to compensate for inadequate primary controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Directive controls

A

Policies or regulations providing
specific guidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Confidentiality, Integrity, and Availability (CIA)

A

Safeguards data confidentiality, , integrity, and accessibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Confidentiality

A

Ensures that sensitive information remains shielded from prying eyes and that access is granted solely to those with the appropriate authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Integrity

A

Prevents unauthorized changes or
manipulations to your information, maintaining its accuracy and reliability. Hashing algorithms such as SHA1 or MD5 provide data integrity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Availability

A

Ensures that your systems are up and running, that your data can be accessed promptly, and that your online services remain accessible.

17
Q

Non-repudiation

A

Prevents denial of one’s actions, ensuring accountability

18
Q

Authentication

A

Purpose: To verify the identity of a user or system.
Process: Involves checking credentials like passwords, PINs, or biometric data (fingerprints, facial recognition).

19
Q

802.1X protocol

A

802.1X takes the lead in authenticating devices seeking access to a network, and each device must have a valid certificate on its endpoint.

20
Q

Authorization

A

Purpose: To determine what an authenticated user or system is allowed to do.
Process: Involves setting permissions and access levels for different resources.

21
Q

Accounting

A

This process involves capturing essential details such as usernames, timestamps, IP addresses, accessed resources, and actions performed

22
Q

AAA server

A

A guard responsible for three important tasks: authentication, authorization, and accounting.

23
Q

AAA protocols

A

RADIUS, Diameter, and TACACS+

24
Q

Gap analysis

A

Gap analysis is a strategic process that evaluates an organization’s security practices against established security standards, regulations, and industry best practices.

25
Key taks of gap analysis
Assessment, benchmarking, identification, prioritization, remediation strategy
26
Zero trust
27
Control plane
The part of a network that controls how data packets are forwarded. The process of creating a routing table, for example, is considered part of the control plane
28
Data plane
In contrast to the control plane, which determines how packets should be forwarded, the data plane actually forwards the packets. The data plane is also called the forwarding plane.
29
Control plane vs Data plane
Think of the control plane as being like the stoplights that operate at the intersections of a city. Meanwhile, the data plane (or the forwarding plane) is more like the cars that drive on the roads, stop at the intersections, and obey the stoplights.
30
31
32
33
34
Control plane 115